Self-organized network-layer security in mobile ad hoc networks
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
IPDPS '02 Proceedings of the 16th International Parallel and Distributed Processing Symposium
Perfectly-Secure Key Distribution for Dynamic Conferences
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Energy-Efficient Communication Protocol for Wireless Microsensor Networks
HICSS '00 Proceedings of the 33rd Hawaii International Conference on System Sciences-Volume 8 - Volume 8
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Guide to Elliptic Curve Cryptography
Guide to Elliptic Curve Cryptography
An authentication framework for hierarchical ad hoc sensor networks
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
A pairwise key pre-distribution scheme for wireless sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Establishing pairwise keys in distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
LEAP: efficient security mechanisms for large-scale distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
TOSSIM: accurate and scalable simulation of entire TinyOS applications
Proceedings of the 1st international conference on Embedded networked sensor systems
Simulating the power consumption of large-scale sensor network applications
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
A study of static versus dynamic keying schemes in sensor networks
PE-WASUN '05 Proceedings of the 2nd ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
SecLEACH - A Random Key Distribution Solution for Securing Clustered Sensor Networks
NCA '06 Proceedings of the Fifth IEEE International Symposium on Network Computing and Applications
On the design of secure protocols for hierarchical sensor networks
International Journal of Security and Networks
TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks
IPSN '08 Proceedings of the 7th international conference on Information processing in sensor networks
A Polynomial Based Key Establishment Scheme for Heterogeneous Sensor Networks
IAS '09 Proceedings of the 2009 Fifth International Conference on Information Assurance and Security - Volume 01
A simple non-interactive pairwise key establishment scheme in sensor networks
SECON'09 Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks
Secure walking GPS: a secure localization and key distribution scheme for wireless sensor networks
Proceedings of the third ACM conference on Wireless network security
A High Security Dynamic Secret Key Management Scheme for Wireless Sensor Networks
IITSI '10 Proceedings of the 2010 Third International Symposium on Intelligent Information Technology and Security Informatics
On the security of cluster-based communication protocols for wireless sensor networks
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part I
Cluster based self-organization management protocols for wireless sensor networks
IEEE Transactions on Consumer Electronics
Primate-Inspired Communication Methods for Mobile and Static Sensors and RFID Tags
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
Hi-index | 0.00 |
Cluster-based organisation is widely used to achieve energy efficiency in Wireless Sensor Networks (WSNs). To achieve confidentiality of the sensed data, it is necessary to have a secret key shared between a node and its Cluster Head (CH). Key management is challenging as the CH changes in every round in cluster-based organisation. In this paper, we propose two schemes for key management in clustered sensor networks with changing CH. In Simple Secure Logical Ring (SSLR) scheme, communication and computation cost incurred for key establishment is constant. In Burmester Desmedt Logical Ring (BDLR) scheme, key establishment is achieved by performing (n + 1) multiplications and (n + 5) communications, where n is the number of nodes in the cluster. Simulation results show that node compromise in the proposed schemes is handled efficiently.